Phase 1
Prerequisites
Phase 2
Networking
Recommendation
TCP/IP Illustrated
Recommended Reading: 'TCP/IP Illustrated, Volume 1: The Protocols' by Kevin R. Fall and W. Richard Stevens
External Resource
Learn More
Phase 3
Security Methods
Recommendation
The Web Application Hacker's Handbook
Definitive guide to finding and exploiting web application security flaws.
External Resource
Learn More